Systematic mapping study on security approaches in secure software engineering

RA Khan, SU Khan, HU Khan, M Ilyas - Ieee Access, 2021 - ieeexplore.ieee.org
In the modern digital era, software systems are extensively adapted and have become an
integral component of human society. Such wide use of software systems consists of large …

Fintech investments in European banks: a hybrid IT2 fuzzy multidimensional decision-making approach

G Kou, Ö Olgu Akdeniz, H Dinçer, S Yüksel - Financial innovation, 2021 - Springer
Financial technology (Fintech) makes a significant contribution to the financial system by
reducing costs, providing higher quality services and increasing customer satisfaction …

Ranking challenges, risks and threats using Fuzzy Inference System

D Bozanic, D Tešić, A Puška, A Štilić… - … in Management and …, 2023 - dmame-journal.org
This paper presents a Fuzzy Inference System (FIS) designed to comprehensively assess
challenges, risks, and threats. In the realm of security and defense, defining these elements …

[HTML][HTML] A comparison between fuzzy AHP and fuzzy TOPSIS methods to software requirements selection

M Nazim, CW Mohammad, M Sadiq - Alexandria Engineering Journal, 2022 - Elsevier
The fuzzy set theory as one of the key agents of artificial intelligence has been used to deal
with vagueness and imprecision during the decision-making process. The software …

Usable Security: A Systematic Literature Review

F Di Nocera, G Tempestini, M Orsini - Information, 2023 - mdpi.com
Usable security involves designing security measures that accommodate users' needs and
behaviors. Balancing usability and security poses challenges: the more secure the systems …

Probability analysis of construction risk based on noisy-or gate bayesian networks

C Ji, X Su, Z Qin, A Nawaz - Reliability Engineering & System Safety, 2022 - Elsevier
During construction risks' probability assessment, it is challenging to obtain the joint
probability distribution (JPD) of target risk systems, because every risk element's probability …

A Fuzzy-AHP based prioritization of trust criteria in fog computing services

SO Ogundoyin, IA Kamil - Applied Soft Computing, 2020 - Elsevier
Fog computing is a new promising paradigm that is capable of addressing the problems with
the traditional cloud computing. However, prior to the development of this qualifiedly roseate …

Ranking security of IoT-based smart home consumer devices

NM Allifah, IA Zualkernan - Ieee Access, 2022 - ieeexplore.ieee.org
Manufacturers of smart home consumer devices like home theatres, music players, voice-
based assistants, smart lighting, and security cameras have widely adopted the Internet of …

The evaluation of software security through quantum computing techniques: A durability perspective

H Alyami, M Nadeem, A Alharbi, W Alosaimi… - Applied Sciences, 2021 - mdpi.com
The primary goal of this research study, in the field of information technology (IT), is to
improve the security and durability of software. A quantum computing-based security …

Effectiveness evaluation of different IDSs using integrated fuzzy MCDM model

H Alyami, MTJ Ansari, A Alharbi, W Alosaimi… - Electronics, 2022 - mdpi.com
Cyber-attacks are becoming progressively complicated; hence, the functional issues of
intrusion-detection systems (IDSs) present ever-growing challenges. Failing to detect …